News

Help Net Security
helpnetsecurity.com > 04/02/2026 > openssh-10-3-released

OpenSSH 10.3 patches five security bugs and drops legacy rekeying support

11+ hour, 3+ min ago  (416+ words) OpenSSH 10.3 shipped carrying five security fixes alongside feature additions and a set of behavior changes that will break compatibility with older SSH implementations that do not support rekeying. SSH clients and servers that lack rekeying support will fail when they…...

Help Net Security
helpnetsecurity.com > 04/02/2026 > red-hat-enterprise-linux-extended-life-cycle-premium

New Red Hat subscription simplifies long-term enterprise Linux support

12+ hour, 42+ min ago  (559+ words) Red Hat has announced Red Hat Enterprise Linux Extended Life Cycle Premium, a new subscription that provides a predictable 14-year life cycle for major Red Hat Enterprise Linux releases. This stand-alone subscription consolidates extended support, simplifying the management of multiple…...

Help Net Security
helpnetsecurity.com > 04/02/2026 > apple-ios-18-darksword-security-updates

DarkSword exploit forces Apple to loosen its patching policy

14+ hour, 36+ min ago  (205+ words) Apple has extended security updates to a wider range of devices still running iOS 18, aiming to protect users from the DarkSword exploit kit. This is not the first time Apple has backported fixes for older devices based on vulnerability severity....

Help Net Security
helpnetsecurity.com > 04/02/2026 > trueconf-zero-day-vulnerability-cyber-espionage

TrueConf zero-day vulnerability exploited to target government networks

16+ hour, 51+ min ago  (270+ words) Malicious client update attack chain (Source: Check Point) TrueConf is a videoconferencing platform designed to run on private local networks (LANs) without internet access, which makes it attractive to government departments, defense institutions, and critical infrastructure operators. Consequently, the solution…...

Help Net Security
helpnetsecurity.com > 04/02/2026 > 5g-drone-detection-system-research

Tracking drones with the 5G tower down the street

20+ hour, 48+ min ago  (605+ words) The 5G-A base station Active Antenna Unit (AAU) and the UAV deployed in the field experiments (Source: Research paper) The researchers ran a DJI Mavic 3T drone along 25 predefined flight paths over seven days, generating 54 test cases and roughly 155 minutes of…...

CIS
helpnetsecurity.com > 04/01/2026 > cis-benchmarks-march-2026-update

CIS Benchmarks March 2026 Update

1+ day, 12+ hour ago  (524+ words) The following CIS Benchmarks and CIS Build Kits have been updated or recently released. We've highlighted the major updates below. Each Benchmark and Build Kit includes a full changelog that references all changes. We are excited to announce the publication…...

Help Net Security
helpnetsecurity.com > 04/01/2026 > exabeam-expands-aba-to-detect-ai-agent-threats-across-chatgpt-copilot-and-gemini

Exabeam expands ABA to detect AI agent threats across ChatGPT, Copilot, and Gemini

1+ day, 12+ hour ago  (205+ words) Exabeam has announced the expansion of Exabeam Agent Behavior Analytics (ABA). Without direct visibility into how employees use AI assistants, what they query, what data they share, how frequently they interact, and from where, organizations cannot establish a baseline for…...

Help Net Security
helpnetsecurity.com > 04/01/2026 > google-chrome-zero-day-cve-2026-5281

Google fixes Chrome zero-day with in-the-wild exploit (CVE-2026-5281)

1+ day, 14+ hour ago  (237+ words) Google has fixed 21 vulnerabilities affecting its popular Chrome browser, among them a zero-day (CVE-2026-5281) with an in-the-wild exploit. As per usual, information about the fixed zero-day is limited, and there's no details about the exploit (or how/if it's being…...

Help Net Security
helpnetsecurity.com > 04/01/2026 > cross-dataset-malware-detection-research

Malware detectors trained on one dataset often stumble on another

1+ day, 21+ hour ago  (476+ words) The study built detection pipelines using a standardized feature format common across six public Windows PE datasets. Two training configurations were tested, one using a combination of the EMBER and BODMAS datasets, the other adding ERMDS, a dataset constructed specifically…...

Help Net Security
helpnetsecurity.com > 03/31/2026 > pondurance-mdr-essentials-soc-teams

Pondurance MDR Essentials uses autonomous SOC to tackle AI-driven attacks

2+ day, 9+ hour ago  (461+ words) Pondurance announced MDR Essentials, MDR Essentials, an MDR service providing an autonomous SOC that reduces the time from threat detection to containment by 90%. Threat actors today use AI to attack at machine-speed, making it difficult for traditional cybersecurity solutions to…...